Sciweavers

507 search results - page 64 / 102
» Defensive Marketing Strategies
Sort
View
ICDCS
2012
IEEE
12 years 2 days ago
Towards Optimal Capacity Segmentation with Hybrid Cloud Pricing
—Cloud resources are usually priced in multiple markets with different service guarantees. For example, Amazon EC2 prices virtual instances under three pricing schemes — the su...
Wei Wang, Baochun Li, Ben Liang
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
14 years 3 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
CEAS
2008
Springer
13 years 11 months ago
Improving Email Trustworthiness through Social-Group Key Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense aga...
Vivek Pathak, Liviu Iftode, Danfeng Yao
ECIS
2001
13 years 11 months ago
Web Technologies and Value Innovation in the Italian Retail Banking Industry
Interpreting the outcome of a recent survey on Internet banking in Europe, [CARIGNANI et al., 2000], we point the attention to the adoption of Web technologies in Italian retail b...
Francesco Virili, Andrea Carignani
CMG
1997
13 years 11 months ago
Capacity Planning in Distributed Environments
Capacity Planning has been a discipline practiced by IT since before the invention of the mainframe. It encompasses different measurement, analysis, modeling and reporting techniq...
Bernard Domanski